To help you protect your ESXi™ installation, this documentation describes security features built in to ESXi and the measures that you can take to safeguard it from attack.

Intended Audience

This information is intended for anyone who wants to secure their ESXi configuration. The information is written for experienced Windows or Linux system administrators who are familiar with virtual machine technology and datacenter operations.